Mechanism to provide customer vcn network encryption using customer-managed keys in network virtualization device

a virtualization device and customer technology, applied in the field of virtual cloud networks, can solve the problems of security, performance penalty, unauthorized parties not being able to view plaintext data,

Pending Publication Date: 2022-06-23
ORACLE INT CORP
View PDF12 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0011]The foregoing, together with other features and embodiments will become more ...

Problems solved by technology

3DES can provide a high degree of message security, but with a performance penalty.
The magnitude of the performance penalty can depend on the speed of the processor...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mechanism to provide customer vcn network encryption using customer-managed keys in network virtualization device
  • Mechanism to provide customer vcn network encryption using customer-managed keys in network virtualization device
  • Mechanism to provide customer vcn network encryption using customer-managed keys in network virtualization device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028]In the following description, for the purposes of explanation, specific details are set forth in order to provide a thorough understanding of certain embodiments. However, it will be apparent that various embodiments may be practiced without these specific details. The figures and description are not intended to be restrictive. The word “exemplary” is used herein to mean “serving as an example, instance, or illustration.” Any embodiment or design described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other embodiments or designs.

[0029]A virtual cloud network (VCN) is a customizable and private network. A host can provide computing hardware and / or software for a customer to set up a VCN. Typically, the host manages encryption, if any, for a VCN. A customer might not want the host to manage encryption because the customer could fear a data breach of the host could compromise customer data, or the customer might be concerned about how...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A network interface card, such as a SmartNIC, is used to provide encryption, such as network encryption virtual function (NEVF), for a virtual machine, so that a customer can control network keys in a virtual cloud network. The NEVF includes a memory device (e.g., SRAM) and a crypto processor (e.g., a crypto core). The memory device stores a crypto key. The crypto processor uses the crypto key to encrypt data to and from a virtual machine in the virtual cloud network. A key management system can be used to securely transfer crypto keys to the NEVF. Having one NEVF per virtual machine can enable a customer to manage the crypto key for a virtual cloud network.

Description

CROSS-REFERENCES TO RELATED APPLICATIONS[0001]The following two U.S. patent applications (including this one) are being filed concurrently, and the entire disclosure of the other application is incorporated by reference into this application for all purposes:[0002]Application ______, filed ______, 2020, entitled “MECHANISM TO PROVIDE CUSTOMER VCN NETWORK ENCRYPTION USING CUSTOMER-MANAGED KEYS IN NETWORK VIRTUALIZATION DEVICE” (Attorney Docket No. 088325-1200452-275800US); and[0003]Application ______, filed ______, 2020, entitled “END-TO-END NETWORK ENCRYPTION FROM CUSTOMER ON-PREMISE NETWORK TO CUSTOMER VIRTUAL CLOUD NETWORK USING CUSTOMER-MANAGED KEYS” (Attorney Docket No. 088325-1200458-275900US).BACKGROUND[0004]A virtual cloud network (VCN) is a customizable and private network. Similar to a traditional data center network, the VCN provides control over a network environment. This includes assigning private IP addresses, creating subnets, creating route tables, and configuring fi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/14G06F9/455
CPCH04L9/0897H04L9/14G06F2009/45595G06F9/45558G06F2009/45575H04L9/0891H04L63/04H04L63/0428H04L63/0435G06F2009/45562
Inventor POTLAPALLY, NACHIKETH RAOVINCENT, PRADEEPBRAR, JAGWINDER SINGH
Owner ORACLE INT CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products